huntergregal / malwareSandbox
A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis
☆43Updated 7 years ago
Alternatives and similar repositories for malwareSandbox:
Users that are interested in malwareSandbox are comparing it to the libraries listed below
- Exploit Reliability Testing System☆34Updated 9 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- Volatility Plugins☆21Updated 9 years ago
- Simple DDE object detector☆56Updated 7 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- A warehouse for your malware☆134Updated 11 years ago
- ☆73Updated 2 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 6 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Updated 10 years ago
- Babel Scripting Framework☆42Updated 4 years ago
- Some simple and useful tools☆15Updated 6 years ago
- Talk given at DerbyCon and RuxCon 2016☆22Updated 8 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 10 years ago
- Tool for dropping malware from EK☆40Updated 7 years ago
- Automated memory forensics analysis☆33Updated 5 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- ☆68Updated 7 years ago
- ☆46Updated 8 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆42Updated 8 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- ☆27Updated 7 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- ☆16Updated 10 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago